Search

Your search keyword '"Günlü A"' showing total 1,258 results

Search Constraints

Start Over You searched for: Author "Günlü A" Remove constraint Author: "Günlü A"
1,258 results on '"Günlü A"'

Search Results

1. Yield of forests in Ankara Regional Directory of Forestry in Turkey: comparison of regression and artificial neural network models based on statistical and biological behaviors

2. Deep Learning-based Codes for Wiretap Fading Channels

3. Low-latency Secure Integrated Sensing and Communication with Transmitter Actions

4. Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading

5. Transmitter Actions for Secure Integrated Sensing and Communication

6. Secure Coded Distributed Computing

7. Rate-limited Shuffling for Distributed Computing

8. Multi-access Distributed Computing Models from Map-Reduce Arrays

10. Generalized Rainbow Differential Privacy

11. Secure Integrated Sensing and Communication

12. Corporate social responsibility communication strategies of hotel companies

13. Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE

19. Secure and Private Source Coding with Private Key and Decoder Side Information

21. Secure Joint Communication and Sensing

22. Rainbow Differential Privacy

24. Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

25. Generalized Rainbow Differential Privacy

27. Quality of Service Guarantees for Physical Unclonable Functions

28. Doubly-Exponential Identification via Channels: Code Constructions and Bounds

29. Secure Multi-Function Computation with Private Remote Sources

30. Semantic Security for Indoor THz-Wireless Communication

31. Effects of Quantization on the Multiple-Round Secret-Key Capacity

32. Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication

33. On Skew Convolutional and Trellis Codes

36. Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary

37. Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

38. Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage

39. Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage

40. Low-complexity and Reliable Transforms for Physical Unclonable Functions

41. Secure and Reliable Key Agreement with Physical Unclonable Functions

42. Differential Privacy for Eye Tracking with Temporal Correlations

49. Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

Catalog

Books, media, physical & digital resources